Eliminating Preventable Harm

One of Benjamin Franklin’s many memorable quotes is “Our new Constitution is[...]

Multi-Factor Authentication And PCI Compliance

According to a ConsumerCredit.com infographic, “80% of consumer spending was[...]

Binary Versus Continuous Authentication

From ancient to modern times, the concept of a gatekeeper, bouncer or[...]

Evaluating Multi-factor Authentication Solutions Today

“Complicated” doesn’t equate to “better” (or even “more secure”) when it[...]

The 3 Benefits of Multi-Factor Identity Authentication for Your Business

Are you aware that last year, data breaches jumped 29% in the first six[...]

4 Cybersecurity Trends on the Horizon in 2019

Cybersecurity trends evolve as fast as cybertechnology. It's hard to keep up.

Credential Stuffing And Account Takeovers, Oh My

If you are an American Chief Information Security Officer (CISO) or IT[...]

Why Your Business Needs Identity and Access Management

Identity theft is rampant. In 2017, over 16.7 million consumers in the[...]

Beyond the Password: What Other Identity Authentication Technologies Are There?

What if you put your entire company at risk because your identity[...]

The Evolution of Identity Authentication

Your login credentials have been compromised. Your passwords have been[...]